Thomas Welsh
Thomas Welsh
Lero - The Irish Software Research Centre
Verified email at lero.ie
Title
Cited by
Cited by
Year
User profiling for energy optimisation in mobile cloud computing
E Benkhelifa, T Welsh, L Tawalbeh, Y Jararweh, A Basalamah
Procedia Computer Science 52, 1159-1165, 2015
1512015
A critical review of practices and challenges in intrusion detection systems for IoT: Toward universal and resilient systems
E Benkhelifa, T Welsh, W Hamouda
IEEE Communications Surveys & Tutorials 20 (4), 3496-3509, 2018
562018
GA-based resource augmentation negotation for energy-optimised mobile ad-hoc cloud
E Benkhelifa, T Welsh, L Tawalbeh, A Khreishah, Y Jararweh, ...
2016 4th IEEE International Conference on Mobile Cloud Computing, Services …, 2016
142016
Energy optimisation for mobile device power consumption: A survey and a unified view of modelling for a comprehensive network simulation
E Benkhelifa, T Welsh, L Tawalbeh, Y Jararweh, A Basalamah
Mobile Networks and Applications 21 (4), 575-588, 2016
122016
Exploiting social networks for the prediction of social and civil unrest: A cloud based framework
E Benkhelifa, E Rowe, R Kinmond, OA Adedugbe, T Welsh
2014 International Conference on Future Internet of Things and Cloud, 565-572, 2014
82014
Mitigating anti-forensics in the cloud via resource-based privacy preserving activity attribution
A Odebade, T Welsh, S Mthunzi, E Benkhelifa
2017 Fourth International Conference on Software Defined Systems (SDS), 143-149, 2017
52017
Security testing in the cloud by means of ethical worm
E Benkhelifa, T Welsh
2013 IEEE Globecom Workshops (GC Wkshps), 500-505, 2013
52013
Leveraging software-defined-networking for energy optimisation in mobile-cloud-computing
E Benkhelifa, T Welsh, L Tawalbeh, Y Jararweh, M Al-Ayyoub
Procedia Computer Science 94, 479-484, 2016
42016
Towards Malware Inspired Cloud Self-Protection
E Benkhelifa, T Welsh
2014 International Conference on Cloud and Autonomic Computing, 1-2, 2014
42014
Embyronic model for highly resilient PaaS
T Welsh, E Benkhelifa
2018 Fifth International Conference on Software Defined Systems (SDS), 197-204, 2018
32018
Perspectives on resilience in cloud computing: Review and trends
T Welsh, E Benkhelifa
2017 IEEE/ACS 14th International Conference on Computer Systems and …, 2017
32017
Automated negotiated user profiling across distributed social mobile clouds for resource optimisation
E Benkhelifa, T Welsh, L Tawalbeh, Y Jararweh
Concurrency and Computation: Practice and Experience 32 (1), e4349, 2020
12020
Bioinspired Multiagent Embryonic Architecture for Resilient Edge Networks
T Welsh, E Benkhelifa
IEEE Transactions on Industrial Informatics 15 (12), 6344-6353, 2019
12019
Virtual Environments Testing as a Cloud Service: A Methodology for Protecting and Securing Virtual Infrastructures
E Benkhelifa, AB Hani, T Welsh, S Mthunzi, CG Guegan
IEEE Access 7, 108660-108676, 2019
12019
A novel architecture for self-propagating malicious software within cloud infrastructures
E Benkhelifa, T Welsh
2013 International Conference on Cloud Computing and Big Data, 60-67, 2013
12013
A cloud enabled social media monitoring platform for events detection and prediction
E Benkhelifa, T Welsh
8th International Conference for Internet Technology and Secured …, 2013
12013
A national survey of attitudes to COVID-19 digital contact tracing in the Republic of Ireland
ME O'Callaghan, J Buckley, B Fitzgerald, K Johnson, J Laffey, ...
2020
On Resilience in Cloud Computing: A survey of techniques across the Cloud Domain
T Welsh, E Benkhelifa
ACM Computing Surveys (CSUR), 2020
2020
Securing The E-infrastructure In Qatar Through Malware Inspired Cloud Self-protection
E Benkhelifa, T Welsh
Qatar Foundation Annual Research Conference Proceedings Volume 2014 Issue 1 …, 2014
2014
A Novel Cloud-Based Multi-Tenancy Architecture with Efficient Hybrid Authentication Mechanism for Enhanced Security and Resource Optimization
E Benkhelifa, DA Fernando, T Welsh
International Journal of Cloud Applications and Computing (IJCAC) 3 (3), 34-49, 2013
2013
The system can't perform the operation now. Try again later.
Articles 1–20